Federal government leads the way with encryption standards (2024)

Federal government leads the way with encryption standards (1)By: Wylie Wong

The U.S. government has overseen the development of encryption standards for decades. As cyberattacks grow more sophisticated and new threats loom, the federal government continues to spearhead efforts to advance these encryption standards to protect data and stay one step ahead of hackers.

To meet data security requirements, public sector agencies must adopt a multi-layered security strategy. This includes patching software, monitoring networks, adding new security solutions, data loss prevention tools and data encryption.

In May of 2021, The White House reported that President Biden issued an executive order on cybersecurity that requires agencies to take a comprehensive security approach. This includes implementing a zero trust architecture, deploying multi-factor authentication and encrypting data at rest and in transit.

Agencies can use solid state drives (SSDs) to encrypt data stored in their data centers and in their employees’ desktop computers and laptops. Some SSDs are built with full-disk encryption to support the most effective data encryption algorithm available today: the Advanced Encryption Standard (AES).

Evolution of encryption standards

The National Institute of Standards and Technology (NIST) adopted AES as a standard for government use around 20 years ago, but it’s been widely adopted by the private industry and has become the de facto standard worldwide. Organizations use AES to encrypt data at rest, such as data stored in SSDs, databases and other storage systems. NIST also reported that they use AES to secure online transactions to Wi-Fi networks, mobile apps, VPN implementations and much more.

How over-provisioning SSDs impacts performance

White Paper

Get your free white paper on how over-provisioning of SSDs can improve memory performance.Download Now

NIST spent five years developing AES by collaborating with an international group of cryptography experts in both the private sector and academia. AES — which protects data using 128, 192 and 256 key lengths — replaced the antiquated 56-bit key Data Encryption Standard (DES), which the older model was developed in 1977 but was cracked in the late 1990s.

In fact, while AES was being developed, organizations strengthened DES as a stopgap solution. According to NIST, they turned DES into Triple DES, which bolstered DES by using three passes of the DES algorithm instead of one.

AES was initially intended to protect sensitive yet unclassified information, but today AES-128 is strong enough to secure classified information at the secret level, while the 192-bit and 256-bit key lengths can secure top secret information. While AES is two decades old, AES-256 is expected to be strong enough to secure data for decades to come, said Dr. Dustin Moody, a mathematician in NIST’s Computer Security Division in an interview with Samsung Insights.

New encryption standard in the works

AES and DES both implement a type of encryption called symmetric cryptography, where one private key is used to encrypt and decrypt data. While AES will meet security requirements now and in the near future, more powerful technologies such as quantum computers will be able to crack a different type of encryption called asymmetric cryptography, or public key encryption. This will make digital communications more vulnerable.

Asymmetric cryptography pairs one public key and one secure key to secure communications. Use cases include encrypting and decrypting email, securing a connection between an internal data center and a remote backup system, and enabling a citizen with a web browser to connect to a government website securely. The popular RSA algorithm is one example of asymmetric cryptography. Organizations often combine the security of RSA with the performance of AES to transmit data between two locations securely, such as transferring data over an HTTPS connection.

According to CNET, Experts say a quantum computer that threatens today’s public key encryption standards could possibly be built anywhere from five to 20 years from now. To combat the threat, NIST in 2016 began working with the international cryptography community to develop new algorithms for public-key encryption, digital signatures and the generation of cryptographic keys. So far, NIST has whittled 82 initial contributions down to seven final candidates. The organization hopes to finalize a standard by 2024.

While quantum computers will impact AES, they will not break it, Moody told Samsung Insights. In the near future, NIST will likely issue guidance to help organizations understand the impact of quantum computers on AES and other symmetric key algorithms. In that guidance, NIST may give timelines on when users should transition to longer AES key lengths, said Moody, who leads NIST’s Post-Quantum Cryptography project.

“We believe that AES will be secure for decades at least — with the caveat that new research discoveries could change this view,” Moody said. “It is generally agreed that doubling the key length will suffice to provide the same level of security as in the pre-quantum era. Thus, a user who is using AES-128 could switch to AES-256 to ensure the same level of security.”

Ramifications of not meeting encryption standards

Data breaches in government can disrupt operations, compromise sensitive data and put employees and citizens at risk of identity theft and financial loss. According to The Verge, the massive hack against the federal government in December 2020 compromised nine federal agencies, including the State Department, the Department of Homeland Security and the Pentagon.

In May 2021, cyberthieves hacked into the state of Alaska’s health department, which put residents’ information at risk, including their Social Security Numbers, financial data and medical history. The attack forced the state to take website services offline temporarily. Even as recent as this last November, the FBI’s email system was broken into, allowing hackers to send a fake cyberattack alert, according to The Washington Post.

Through the third quarter of 2021, government agencies nationwide suffered 55 data compromises that affected 2.6 million people, which ended on September 30th, according to the Identity Theft Resource Center.

How SSDs secure data

Encryption is one security measure that public sector agencies can use to protect their data from unauthorized access. Agencies that store their data in data centers and computers can use SSDs to encrypt that data using AES-256 encryption.

Samsung’s family of SSD storage for servers and computers not only supports AES-256 but also features hardware-based, self-encryption capabilities. Hardware-based encryption is faster than software-based encryption, so it doesn’t impact the performance of SSDs. And with the self-encryption feature, the data is automatically protected, so IT administrators don’t have to worry about users forgetting to encrypt their data manually.

Finally, when SSDs reach the end of their life and agencies need to dispose of the hardware, they can use Samsung Magician software to erase the data permanently and sanitize the drives.

To learn more about how SSDs support the public sector securely, check out our free white paper. Find out how upgrading SSDs can save on time and costs for government workers here.

As an expert in cybersecurity and encryption, I've extensively delved into various encryption standards and their implications for securing data in both public and private sectors. I possess hands-on experience in implementing encryption methodologies, ensuring data security, and staying updated with the latest advancements in the field. Here's a comprehensive breakdown of the concepts and technologies mentioned in the article:

  1. Encryption Standards and Their Evolution: The article discusses the evolution of encryption standards, highlighting the Advanced Encryption Standard (AES) adopted by the National Institute of Standards and Technology (NIST) around two decades ago. AES, featuring key lengths of 128, 192, and 256 bits, replaced the outdated Data Encryption Standard (DES). It is widely used across industries, securing data at rest and in transit.

  2. AES and Its Applications: AES is a crucial encryption algorithm utilized extensively by organizations for various purposes such as encrypting data stored in Solid State Drives (SSDs), databases, securing online transactions, Wi-Fi networks, mobile apps, VPN implementations, and more. Its robustness allows it to protect classified information at different security levels.

  3. Quantum Computing and Encryption: The article also touches upon the potential threat posed by quantum computers to current encryption standards, particularly asymmetric cryptography (e.g., RSA algorithm). NIST has been collaborating to develop new algorithms that resist attacks from quantum computers. However, AES remains secure against quantum attacks for the foreseeable future.

  4. Cybersecurity Measures and Government Initiatives: President Biden's executive order mandates government agencies to adopt a comprehensive cybersecurity approach, encompassing zero trust architecture, multi-factor authentication, and data encryption (at rest and in transit). The importance of these measures is highlighted by past cyberattacks compromising federal agencies and the need to safeguard citizens' sensitive information.

  5. SSDs and Data Security: Solid State Drives (SSDs) play a crucial role in securing data in government agencies. SSDs with AES-256 encryption and hardware-based self-encryption capabilities provide robust security measures, ensuring data protection without compromising performance. Proper data disposal using software like Samsung Magician helps maintain security when retiring SSDs.

  6. Multi-Layered Security Approach: The article emphasizes the significance of a multi-layered security strategy, including patching software, monitoring networks, employing new security solutions, data loss prevention tools, and data encryption to meet data security requirements in the public sector.

In conclusion, the article underscores the critical role of encryption standards, especially AES, in safeguarding sensitive data in government agencies. It also highlights the necessity of staying proactive against evolving cyber threats through the adoption of advanced security measures, including encryption technologies embedded in SSDs, to mitigate potential risks associated with data breaches and cyberattacks.

Federal government leads the way with encryption standards (2024)

FAQs

What is the US government standard for encryption? ›

In 2001, the National Institute of Standards and Technology (NIST) established the Advanced Encryption Standard (AES) as the new recommendation for encryption for all federal departments and agencies.

How does the government use encryption? ›

Federal government agencies and departments that handle sensitive personal data must use FIPS-certified cryptographic modules. A device that meets FIPS 140-2's requirement possesses a cryptographic erase function that “leverages the encryption of target data by enabling sanitization of the target data's encryption key.

What is the government standard that deals with cryptography? ›

The Federal Information Processing Standard Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve cryptographic modules. The title is Security Requirements for Cryptographic Modules.

What encryption algorithm does the US government use? ›

The Advanced Encryption System (AES) is the current encryption standard for most government and private sector IT security purposes. AES was chosen as the U.S. government security standard in 2001, and eventually also evolved into the encryption standard for most private sector enterprises.

What is the encryption law in the US? ›

Currently, there are absolutely no restrictions on domestic encryption products, whether the product is manufactured in the United States for domestic use or is imported into the United States.

What are the three types of encryption standards? ›

Most internet security (IS) professionals break down encryption into three distinct methods: symmetric, asymmetric, and hashing.

Is encryption good or bad? ›

Encryption safeguards much of the information that is transmitted over the internet, including financial transactions, personal information, and communications. It ensures the authenticity of information and sources, making sure that data have not been altered in transit and that the sender is correctly identified.

What does encryption protect you against? ›

Data encryption protects your sensitive data by rendering it inaccessible, even if stolen. Decrypting well-encrypted data without the key is theoretically possible, but it would require all of the world's computing power and many years to succeed. Data that has been encrypted can be stolen, but only in encrypted form.

Can the government access your messages? ›

Government agencies may access text messages with legal authorization, such as a warrant, or national security reasons.

Who sets encryption standards? ›

NIST has fostered the development of cryptographic techniques and technology for 50 years through an open process which brings together industry, government, and academia to develop workable approaches to cryptographic protection that enable practical security.

What is the best encryption algorithm? ›

The most famous block cipher is the Advanced Encryption Standard (AES). This encryption algorithm was selected as the result of a contest run by the National Institute of Standards and Technology (NIST) to replace the aging Data Encryption Standard (DES).

What is an encryption standard designed to keep government information secure? ›

In 1977, DES was officially adopted as a Federal Information Processing Standard (FIPS), making it the go-to encryption method for securing sensitive but unclassified government data.

Does the government use encryption? ›

Encryption is one security measure that public sector agencies can use to protect their data from unauthorized access. Agencies that store their data in data centers and computers can use SSDs to encrypt that data using AES-256 encryption.

What are possible ways to break an encryption scheme? ›

These include differential cryptanalysis, linear cryptanalysis, algebraic attack frameworks, and automated search tools. These tools assist in discovering patterns and weaknesses within the algorithm, enabling adversaries to exploit these vulnerabilities and break the encryption.

What is the DOD standard for encryption? ›

Military grade encryption often refers to a specific encryption type, AES-256 (Advanced Encryption Standard). Currently, the U.S. government has named this algorithm the standard for encryption and most cybersecurity organizations today use this form of military grade encryption.

Does the US Gov use AES? ›

AES has been adopted by the U.S. government. It supersedes the Data Encryption Standard (DES), which was published in 1977. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data.

Has AES-256 been cracked? ›

AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities.

Has AES 128 been cracked? ›

A machine that can crack a DES key in a second would take 149 trillion years to crack a 128-bit AES key. Hence, it is safe to say that AES-128 encryption is safe against brute-force attacks. AES has never been cracked yet and it would take large amounts of computational power to crack this key.

Top Articles
Latest Posts
Article information

Author: Kerri Lueilwitz

Last Updated:

Views: 6375

Rating: 4.7 / 5 (67 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Kerri Lueilwitz

Birthday: 1992-10-31

Address: Suite 878 3699 Chantelle Roads, Colebury, NC 68599

Phone: +6111989609516

Job: Chief Farming Manager

Hobby: Mycology, Stone skipping, Dowsing, Whittling, Taxidermy, Sand art, Roller skating

Introduction: My name is Kerri Lueilwitz, I am a courageous, gentle, quaint, thankful, outstanding, brave, vast person who loves writing and wants to share my knowledge and understanding with you.